Under construction

New design coming soon!

CIC News engine statistics

CIC News for 27-05-2014 contains 34 articles: cybercrime(13),cyber security(6),data breach(12),other(3)

CIC News update contains 29 English and 5 Dutch articles for today.
In today's English news articles:
- 9 related to cybercrime
- 6 related to cyber security
- 12 related to data breach and identity theft
- 2 for the category other news

In today's Dutch news articles:
- 4 related to cybercrime
- 0 related to cyber security
- 1 for the category other news

Have fun reading.

English cybercrime related news

Turkish army to buy 100 pct domestic technology against cybercrimeLocation: NATO - Brussel, Belgium
Date published: 27-05-2014

The Turkish Armed Forces is set to cooperate with the Undersecretary for Defense Industries (SSM), the countrys top defense procurement office, to buy 100 percent domestic hardware and software to fight against cybercrime. The equipment and computer software, which will be used by th... Read more

Source: www.hurriyetdailynews.com

Top found tags: government(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Webcam Cyber Crime Help Against Blackmail Plus BullyingLocation: Dubai, United Arab Emirates
Date published: 25-05-2014

There are a great deal of Filipina females in Dubai. Dubai has the largest population plus second biggest territory of land among the 7 emirates. Currently, it has become a company center plus a global city, considering that it becomes the many progressive city in the Middle East. With this, it has... Read more

Source: www.gardenawomensauna.com

Top found tags: cybercrime(2),United Arab Emirates(3),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Ransomware Computer Virus On The RiseLocation: Ransom, United States
Date published: 26-05-2014

PHILADELPHIA - It may look official, but its really a computer virus that is meant to scare you.It's called Ransomware, a class of malware which restricts access to the computer system that it infects and demands a ransom paid to the creator of the malware in order for the restriction to be remo... Read more

Source: www.myfoxphilly.com

Top found tags: website(1),government(2),cybercrime(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybercrime is a vector Says FBI DirectorLocation: Beijing, China
Date published: 27-05-2014

WASHINGTONJames B. Comey, director of the Federal Bureau of Investigation, appeared before for the Senate Judiciary Committee on May 21 to receive personal praise from the committee senators for his leadership and the FBIs recent successes. However, while there could be little criticism of hi... Read more

Source: www.theepochtimes.com

Top found tags: Gen. Keith Alexander(3),government(5),United States(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Operation takes down crime network affecting European electronic paymentsLocation: Sofia, Bulgaria
Date published: 27-05-2014

Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in The Hague, have smashed another significant Bulgarian organized crime network suspected of a variety of crimes including electronic paymen... Read more

Source: www.net-security.org

Top found tags: government(2),financial sector(4),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Instant messaging Trojan spreads through the UKLocation: Facebook - Menlo Park, United States
Date published: 27-05-2014

Hundreds of computer systems have been infected with the latest instant messaging Trojan. Bitdefender has spotted an increasing wave of infections in the past week in countries such as the UK, Germany, France, Denmark, Romania, the US and Canada.After gaining access to users conta... Read more

Source: www.net-security.org

Top found tags: social media(2),trojan(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cyber sex-crime charges in LondonLocation: Londen, United Kingdom
Date published: 27-05-2014

Some parents in London became concerned when they found that someone had been interacting with their 9-year-old daughter in an inappropriate manner on the internet.The London Police Cyber Crime Unit conducted an investigation afterthe girl's parents made a complaint, and they raided a Sussex Place ... Read more

Source: www.country1073.ca

Top found tags: child pornography(4),telecom sector(4),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Greece's cybercrime squad traces online fraudstersLocation: Bucharest, Romania
Date published: 27-05-2014

Officers from the polices cybercrime squad have traced a 52-year-old Greek man and a 26-year-old Romanian national who are alleged to have made a series of online purchases using stolen credit card details, sources indicated on Tuesday.The investigation was launched early this year following a t... Read more

Source: www.ekathimerini.com

Top found tags: credit card(2),cybercrime(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Turkish army to buy 100 pct domestic technology against cybercrimeLocation: NATO - Brussel, Belgium
Date published: 27-05-2014

The Turkish Armed Forces is set to cooperate with the Undersecretary for Defense Industries (SSM), the countrys top defense procurement office, to buy 100 percent domestic hardware and software to fight against cybercrime. The equipment and computer software, which will be used by the Cyber Secu... Read more

Source: cybersafetyunit.com

Top found tags: government(2),cybercrime(3),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English cyber security related news

British NGO Sues GCHQ Over Unlawful Utilization of MalwareLocation: GCHQ - Cheltenham, United Kingdom
Date published: 27-05-2014

Privacy International (PI) an NGO based in UK has filed a suit against GCHQ (Government Communications Headquarters) the spying agency of Britain alleging that the agency illegally created and used malware to hack into PCs' microphones and cameras from remote devoid of taking users' permission, pub... Read more

Source: www.spamfighter.com

Top found tags: telecom sector(4),United States(4),United Kingdom(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Zberp: New Trojan Created From Leaked Zeus, Carberp Source CodeLocation: Trusteer - Boston, United States
Date published: 26-05-2014

Security researchers from Trusteer have been monitoring a new Trojan which theyve dubbed Zberp, and is a combination between Zeus and Carberp families of malware. The source code for the notorious Zeus banking Trojan was leaked back in 2011 and the source code for Carberp was put up for sale on ... Read more

Source: www.securityweek.com

Top found tags: malware(3),financial sector(4),cybercrime(9)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cybersecurity business cyberwarfare critical infrastructureLocation: Pinterest HQ - San Francisco, United States
Date published: 27-05-2014

Many of the future cyberattacks could take advantage of vulnerabilities similar to Heartbleed, a major Internet security flaw which allows attackers to gain access to encrypted passwords, credit card details, and other data on trusted Web sites including Facebook, Gmail, Instagram, and Pinterest. A... Read more

Source: www.homelandsecuritynewswire.com

Top found tags: medical sector(4),cybercrime(6),cyber security(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Phishing attacks: the social engineering killerLocation: New York, United States
Date published: 27-05-2014

Today, most organisations rely heavily on email and internet connectivity to conduct their business but unfortunately cyber criminals are also using these to try and exploit vulnerabilities and human behaviour for personal gain.If you havent noticed yet, phishing attacks are among a class of thr... Read more

Source: exchange.telstra.com.au

Top found tags: vulnerability(2),cybercrime(4),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Smartphones: The threat in your pocketLocation: Evans, United States
Date published: 27-05-2014

A Boise PI sees hackers and prying eyes gleaning personal data from smartphones. Your smartphone holds your secrets.Text messages. Emails. Banking passwords. Hackers can steal just about any personal information that can be used to rob you or snoop on your activities by acce... Read more

Source: www.idahostatesman.com

Top found tags: child pornography(4),cybercrime(6),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Galaxy S5 users have pledged $17,000 to find a root exploitLocation: Google HQ - Mountain View, United States
Date published: 27-05-2014

There was a time several years ago when getting root access on an Android phone was trivial. Any number of apps in Google Play (Android Market at the time) could be installed that would run near universal root exploits. Things are much different now developers have to hunt for exploits on most ... Read more

Source: www.geek.com

Top found tags: Google Play(2),security measures(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
English data breach and identity theft related news

Critical Care: The Far-Reaching Effects of Medical Identity TheftLocation: New York, United States
Date published: 27-05-2014

Medical identity theft is something that can affect your clients, their medical coverage and their lives The words identity theft conjure up a pretty frightening picture. However, medical identity theft can not only threaten your clients financial well-being, but their lives as... Read more

Source: www.thinkadvisor.com

Top found tags: Ponemon Institute(2),health sector(4),medical sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Avast takes community forum offline after data breachLocation:
Date published: 27-05-2014

Prague-based antivirus company Avast said Monday it took its community forum offline after a data breach, but payment information was not compromised.Prague-based antivirus company Avast said Monday it took its community forum offline after a data breach, but payment information was not... Read more

Source: news.idg.no

Top found tags: data breach(2),cybercrime(3),cyber security(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
How To Protect Yourself After the eBay Data BreachLocation: Bay, United States
Date published: 26-05-2014

With news of the hacking of on-line marketplace eBay, many eBay buyers and sellers are wondering what they can do to protect themselves. The Federal Trade Commissions Bureau of Consumer Protection has released six steps for protecting yourself: 1. Change your eBay password. When you create your ... Read more

Source: www.forbes.com

Top found tags: financial sector(4),United States(4),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay data breach highlights growing need for personal datasecurityLocation: Bay, United States
Date published: 27-05-2014

A cyber attack which led to the data breach of approximately 145 million users personal information reared its head this week, as eBay clamoured to reclaim control of its security by obligating its customers to change theirpasswords. Personal but non-financial information had been breached after... Read more

Source: www.theinformationdaily.com

Top found tags: cyber security(4),cybercrime(8),telecom sector(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Visa, MasterCard push for microchip cards after eBay data breachLocation: New York, United States
Date published: 27-05-2014

In the wake of recent major data breaches, Visa and MasterCard are renewing a push to adopt microchip technology into U.S. credit and debit cards. Company executives say a move away from the current black-magnetic-strip transactions would eliminate a large percentage of credit card fraud.RELATED CO... Read more

Source: www.bizjournals.com

Top found tags: data breach(2),financial sector(2),United States(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Cost of Data Breach Continues to RiseLocation: Berlin, Germany
Date published: 26-05-2014

The Ponemon Instituteand IBM recently released the 2014 Cost of Data Breach study, showing that the cost of data breaches continues to rise, up to $145 per lost record over the $136 from 2013. The average cost to a company was $3.5 million, 15% higher than the 2013 cost.This is the 9th year of this... Read more

Source: blogs.absolute.com

Top found tags: Ponemon Institute(2),United States(2),telecom sector(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
eBay Hack Could Result in Social Engineering SchemesLocation: Bay, United States
Date published: 22-05-2014

You've probably heard by now that eBay is the latest victim of a massive data breach. The popular online auction site has asked users to reset their passwords as a precautionary measure, but the data that matters most is already compromised, and there is nothing you can do to "reset" it. You've pro... Read more

Source: www.computerworld.in

Top found tags: data breach(2),social engineering(2),telecom sector(4)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Data Security: Enough is EnoughLocation: Department of Homeland Security - Washington, United States
Date published: 27-05-2014

TUCSON Just when you think you have everything solved, new technologies hit you, said Rick Dakin, CEO and chief security strategist at Coalfire. These new technologies, which are broadening the cyber attack surface to devices such as satellites, indicate that the cybercrime trend is headi... Read more

Source: www.nacsonline.com

Top found tags: government(4),United States(6),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
AutoNation Acknowledges Third Party Data BreachLocation: Bear Lake, United States
Date published: 27-05-2014

Customers' names, addresses, e-mail addresses and credit card numbers may have been accessed. AutoNation recently began notifying an undisclosed number of customers that their personal information may have been accessed when a third-party vendor's system was hacked.Visitors ... Read more

Source: www.esecurityplanet.com

Top found tags: credit card(2),data breach(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Police looking to bolster cybercrime investigation capabilitiesLocation: Singapore
Date published: 27-05-2014

SINGAPORE, May 27: The picture painted by cybersecurity experts is sobering: a sharp growth in banking malware, more malicious mobile apps and more data breaches resulting in more than 552 million identities exposed last year.Auction site eBay last week announced a major network security breach inv... Read more

Source: www.themalaysiantimes.com.my

Top found tags: cyber security(4),financial sector(4),cybercrime(8)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Verizon Security Research Identifies Cyber Crime PatternsLocation: Verizon HQ - New York, United States
Date published: 27-05-2014

Verizon Communications Inc.securityresearchers recently found that 92 percent of security incidents can be traced to nine basic attack patterns, the Wall Street Journalreports. These findings were the result of the companys2014 Data Breach Investigations Report(DBIR), which analyzed 100,000 secu... Read more

Source: www.retailsolutionsonline.com

Top found tags: financial sector(2),cybercrime(6),cyber security(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Spotify urges Android users to upgrade app following data breachLocation: Google HQ - Mountain View, United States
Date published: 27-05-2014

MUSIC STREAMING SERVICE Spotify is urging users of its Android app to update it following a potential data breach of its servers. News of a data breach, following last week's eBay fiasco, likely will unsettle some people. However, Spotify said on Tuesday that while it has become aware of "unauthori... Read more

Source: www.theinquirer.net

Top found tags: Google Play(2),telecom sector(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Other English news

CryptoDefense ransom malware using Java drive-by exploit to boost infection rateLocation: Oracle - Redwood City, United States
Date published: 27-05-2014

The gang behind the CryptoDefense ransom malware has been distributing it using a simple Java drive-by attack as a way of boosting the number of victims, security firm Bromium has confirmed after analysing a version that appeared in March.Although less well known than the rival CryptoLocker, Crypto... Read more

Source: news.techworld.com

Top found tags: CryptoLocker(2),update(2),malware(3)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Signature-based security obsoleteLocation: Summit, United States
Date published: 27-05-2014

The use of signature-based end-point security solutions is obsolete.So said John McCormack, CEO of Websense, when addressing the ITWeb Security Summit at the Sandton Convention Centre this morning.According to McCormack, in order to mitigate the risks posed by today's complex threat env... Read more

Source: www.itweb.co.za

Top found tags: threat(1),credit card(2),financial sector(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cybercrime related news

Google vereenvoudigt zoektocht naar Mac-malwareLocation: Google HQ - Mountain View, United States
Date published: 26-05-2014

In de hoop meer Mac-malware te ontdekken heeft Google een speciale uploadtool ontwikkeld die Mac-gebruikers kunnen gebruiken om verdachte bestanden te uploaden. Het gaat om de VirusTotal Uploader voor OS X. VirusTotal is een website waarmee verdachte bestanden kunnen worden gescand.De website gebru... Read more

Source: www.security.nl

Top found tags: Windows(1),cybercrime(2),OS X(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Gelikte trojan verschuilt zich achter Apple-logoLocation: Trusteer - Boston, United States
Date published: 27-05-2014

Beveiligers slaan alarm voor een nieuwe en geavanceerde banking trojan. 'Zberp' combineert alle slechte eigenschappen van de beruchte trojans Zeus en Carberp. Zberp heeft een uitgebreide set aan functionaliteit. Onder de gevoelige informatie die de trojan kan stelen zitten IP-adressen, SSL-certific... Read more

Source: webwereld.nl

Top found tags: malware(3),cybercrime(4),financial sector(10)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Virusscanner Sophos beschouwt Tor als malwareLocation: Sophos HQ - Oxfordshire, United Kingdom
Date published: 27-05-2014

De Mac-virusscanner van het Britse anti-virusbedrijf Sophos beschouwt Tor als malware, wat bij verschillende gebruikers van de software voor problemen zorgt. Via Tor kunnen internetgebruikers hun IP-adres verbergen en gecensureerde websites bezoeken. Tor bestaat al geruime tijd en werkte voorheen p... Read more

Source: www.security.nl

Top found tags: cybercrime(2),United Kingdom(2),update(2)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Sector-botnet infecteert ruim 1 miljoen computersLocation: Amsterdam, The Netherlands
Date published: 27-05-2014

Een virus dat op computers allerlei bestanden infecteert heeft in slechts vijf weken tijd meer dan een miljoen machines weten te besmetten, die nu allemaal onderdeel van een botnet zijn. Het gaat om de Sector-malware, ook bekend als Sality, die al sinds 2008 in omloop is.Sector is een zogeheten 'fi... Read more

Source: www.security.nl

Top found tags: wireless(1),Microsoft(2),cybercrime(5)

Oops,image cannot be loaded, maybe blocked content?
Click to open location
Dutch cyber security related news

No articles for today, maybe tomorrow!

Other Dutch news

XP-hulp gevraagd door 68 decentrale overhedenLocation: Microsoft HQ - Redmond, United States
Date published: 26-05-2014

Maar liefst 68 decentrale overheden hebben zich aangemeld voor de ondersteuningsovereenkomst met Microsoft voor extra ondersteuning bij het gebruik van pc's die nog op Windows XP draaien. Verouderd Windows XP valt sinds vorige maand niet langer onder de reguliere ondersteuning van Microsoft. Dat be... Read more

Source: www.binnenlandsbestuur.nl

Top found tags: Informatiebeveiligingsdienst voor gemeenten(3),Vereniging Nederlandse Gemeenten(3),local authority(6)

Oops,image cannot be loaded, maybe blocked content?
Click to open location

This e-mail is automatically generated by the CIC News Engine.

Stay hungry, stay foolish